Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Enhancing Mobile Security through Comprehensive Penetration Testing
(Articles)
Maryam Roshanaei
Journal of Information Security
Vol.15 No.2
,February 27, 2024
DOI:
10.4236/jis.2024.152006
404
Downloads
2,031
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
From Standard Policy-Based Zero Trust to Absolute Zero Trust (AZT): A Quantum Leap to Q-Day Security
(Articles)
Fazal Raheman
Journal of Computer and Communications
Vol.12 No.3
,March 29, 2024
DOI:
10.4236/jcc.2024.123016
211
Downloads
1,406
Views
Citations
Competencies in Computer Security and Resolution of Technological Problems in Higher Education Students
(Articles)
Esteban Pérez Flores
,
Alejandra Aldrette Malacara
,
Sandra R. Murillo Cano
,
Vittorio Zanella Palacios
Journal of Computer and Communications
Vol.12 No.4
,April 24, 2024
DOI:
10.4236/jcc.2024.124013
85
Downloads
484
Views
Citations
Cyber Deception Using NLP
(Articles)
Igor Godefroy Kouam Kamdem
,
Marcellin Nkenlifack
Journal of Information Security
Vol.15 No.2
,April 30, 2024
DOI:
10.4236/jis.2024.152016
171
Downloads
820
Views
Citations
Defining Quantum Advantage for Building a Sustainable MVP to Deliver Quantum Computing Services
(Articles)
Fazal Raheman
Open Journal of Applied Sciences
Vol.14 No.6
,June 24, 2024
DOI:
10.4236/ojapps.2024.146102
76
Downloads
551
Views
Citations
Enhancing Cybersecurity through AI and ML: Strategies, Challenges, and Future Directions
(Articles)
Maryam Roshanaei
,
Mahir R. Khan
,
Natalie N. Sylvester
Journal of Information Security
Vol.15 No.3
,July 5, 2024
DOI:
10.4236/jis.2024.153019
1,171
Downloads
8,316
Views
Citations
Enhancing Cybersecurity through Cloud Computing Solutions in the United States
(Articles)
Omolola F. Hassan
,
Folorunsho O. Fatai
,
Oluwadare Aderibigbe
,
Abdullah Oladoyin Akinde
,
Tolulope Onasanya
,
Mariam Adetoun Sanusi
,
Oduwunmi Odukoya
Intelligent Information Management
Vol.16 No.4
,July 12, 2024
DOI:
10.4236/iim.2024.164011
310
Downloads
1,979
Views
Citations
Futureproofing Blockchain & Cryptocurrencies against Growing Vulnerabilities & Q-Day Threat with Quantum-Safe Ledger Technology (QLT)
(Articles)
Fazal Raheman
Journal of Computer and Communications
Vol.12 No.7
,July 26, 2024
DOI:
10.4236/jcc.2024.127005
109
Downloads
694
Views
Citations
Exploring the Latest Trends in AI Technologies: A Study on Current State, Application and Individual Impacts
(Articles)
Md Ahsan Ullah Imran
,
Mustakim Bin Aziz
,
Anamika Tiwari
,
Sanchita Saha
,
Ashok Ghimire
Journal of Computer and Communications
Vol.12 No.8
,August 13, 2024
DOI:
10.4236/jcc.2024.128002
157
Downloads
1,145
Views
Citations
A Review of Artificial Intelligence Applications in Contemporary Computer Network Technologies
(Articles)
Ackim Lutepo
,
Kai Zhang
Communications and Network
Vol.16 No.3
,August 20, 2024
DOI:
10.4236/cn.2024.163005
201
Downloads
1,242
Views
Citations
Cybersecurity Framework for Kenyan Universities in Conformity with ISO/IEC 27001:2022 Standard
(Articles)
Patrick Macharia Gichubi
,
Bernard Maake
,
Ruth Chweya
Open Access Library Journal
Vol.11 No.8
,August 30, 2024
DOI:
10.4236/oalib.1110810
82
Downloads
515
Views
Citations
Deep Learning-Based Two-Step Approach for Intrusion Detection in Networks
(Articles)
Kamagaté Beman Hamidja
,
Kanga Koffi
,
Kouassi Adless
,
Olivier Asseu
,
Souleymane Oumtanaga
International Journal of Internet and Distributed Systems
Vol.6 No.2
,November 22, 2024
DOI:
10.4236/ijids.2024.62002
90
Downloads
500
Views
Citations
The Innovations and Trends of Information Technology with AI: Weapons to Reassemble the Future World
(Articles)
Nur Vanu
,
Md. Omar Farouk
,
Md. Samiun
,
Sadia Sharmin
,
Misha Billah
,
Saddam Hossain
Journal of Computer and Communications
Vol.12 No.12
,December 18, 2024
DOI:
10.4236/jcc.2024.1212003
69
Downloads
475
Views
Citations
Unveiling Insider Threats: Examining Vulnerabilities in an Organizational Structure: A Case Study of NamPost
(Articles)
Iyaloo N. Waiganjo
,
Linekela S. Nandjenda
Open Access Library Journal
Vol.12 No.1
,January 8, 2025
DOI:
10.4236/oalib.1112797
39
Downloads
263
Views
Citations
A Comparative Analysis of Machine Learning Models for Real-Time IoT Threat Detection with Focus on Mirai Botnet
(Articles)
Muhammad Mamman Kontagora
,
Steve A. Adeshina
,
Habiba Musa
Open Access Library Journal
Vol.12 No.2
,February 21, 2025
DOI:
10.4236/oalib.1112855
43
Downloads
288
Views
Citations
Use of Machine Learning and Deep Learning in Intrusion Detection for IoT
(Articles)
Muhannad Almohaimeed
,
Rasha Alyoubi
,
Afnan Aljohani
,
Mashael Alhaidari
,
Faisal Albalwy
,
Fahad Ghabban
,
Ibrahim Alfadli
,
Omair Ameerbakhsh
Advances in Internet of Things
Vol.15 No.2
,April 1, 2025
DOI:
10.4236/ait.2025.152002
83
Downloads
420
Views
Citations
Evolving Cybersecurity Policy: Addressing Modern Threats and Enhancing Resilience in a Digital Age
(Articles)
Nick Rahimi
,
Mehdi Barati
,
Sarah Lee
Journal of Information Security
Vol.16 No.2
,April 25, 2025
DOI:
10.4236/jis.2025.162017
25
Downloads
170
Views
Citations
Empirical Evidence for a Descriptive Model of Principles of Information Security Course
(Articles)
Adeyemi A. Adekoya
,
Aurelia M. Donald
,
Somasheker Akkaladevi
,
Akinjide A. Akinola
Journal of Information Security
Vol.11 No.4
,August 21, 2020
DOI:
10.4236/jis.2020.114012
655
Downloads
1,649
Views
Citations
Forensic Investigation in Communication Networks Using Incomplete Digital Evidences
(Articles)
Slim REKHIS
,
Jihene KRICHENE
,
Noureddine BOUDRIGA
Int'l J. of Communications, Network and System Sciences
Vol.2 No.9
,December 21, 2009
DOI:
10.4236/ijcns.2009.29100
6,656
Downloads
12,467
Views
Citations
New Video Watermark Scheme Resistant to Super Strong Cropping Attacks
(Articles)
Ming Tong
,
Tao Chen
,
Wei Zhang
,
Linna Dong
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32016
4,757
Downloads
8,039
Views
Citations
<
...
4
5
6
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top